咨询与建议

限定检索结果

文献类型

  • 6,228 篇 会议
  • 5,287 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,640 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,526 篇 工学
    • 5,437 篇 计算机科学与技术...
    • 4,443 篇 软件工程
    • 1,819 篇 信息与通信工程
    • 1,120 篇 控制科学与工程
    • 930 篇 电气工程
    • 905 篇 生物工程
    • 691 篇 电子科学与技术(可...
    • 607 篇 生物医学工程(可授...
    • 575 篇 光学工程
    • 544 篇 机械工程
    • 373 篇 仪器科学与技术
    • 345 篇 化学工程与技术
    • 343 篇 网络空间安全
    • 326 篇 动力工程及工程热...
    • 280 篇 交通运输工程
    • 263 篇 安全科学与工程
  • 4,151 篇 理学
    • 2,055 篇 数学
    • 1,315 篇 物理学
    • 1,014 篇 生物学
    • 684 篇 统计学(可授理学、...
    • 417 篇 系统科学
    • 383 篇 化学
  • 2,101 篇 管理学
    • 1,249 篇 管理科学与工程(可...
    • 940 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 622 篇 医学
    • 533 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 297 篇 公共卫生与预防医...
    • 259 篇 药学(可授医学、理...
  • 398 篇 法学
    • 310 篇 社会学
  • 192 篇 经济学
  • 162 篇 教育学
  • 142 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 317 篇 deep learning
  • 267 篇 machine learning
  • 261 篇 feature extracti...
  • 225 篇 computational mo...
  • 210 篇 accuracy
  • 187 篇 semantics
  • 178 篇 internet of thin...
  • 176 篇 predictive model...
  • 163 篇 training
  • 154 篇 real-time system...
  • 119 篇 data mining
  • 116 篇 neural networks
  • 116 篇 optimization
  • 113 篇 support vector m...
  • 110 篇 security
  • 110 篇 artificial intel...
  • 106 篇 computer science
  • 95 篇 visualization
  • 88 篇 cloud computing
  • 87 篇 data models

机构

  • 176 篇 university of ch...
  • 127 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 101 篇 school of comput...
  • 95 篇 hebei normal uni...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 school of comput...
  • 78 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 57 篇 school of inform...
  • 57 篇 school of comput...
  • 57 篇 school of inform...
  • 57 篇 college of compu...
  • 52 篇 school of comput...
  • 52 篇 college of intel...
  • 51 篇 institute for nu...
  • 51 篇 school of physic...

作者

  • 97 篇 niyato dusit
  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 9,084 篇 英文
  • 2,435 篇 其他
  • 143 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11640 条 记 录,以下是1091-1100 订阅
排序:
Block information strategy for multi-modal remote sensing image registration
收藏 引用
Engineering Applications of Artificial Intelligence 2025年 157卷
作者: Hong, Yameng Leng, Chengcai Liu, Beihua Peng, Jinye Cheng, Irene Basu, Anup School of Mathematics Northwest University China School of Information Science and Technology Northwest University China Department of Computing Science University of Alberta Edmonton Canada
Registration of multi-modal remote sensing image pairs (MRSI) is challenging given the distinct imaging mechanisms of multi-modal data sources, which lead to substantial geometric and radiometric distortions and inacc... 详细信息
来源: 评论
OIDCBMS: A Novel Neural Network based Intrusion Detection System to Cloud computing based on New Cube Algorithm  4
OIDCBMS: A Novel Neural Network based Intrusion Detection Sy...
收藏 引用
4th International Conference on Inventive Research in computing Applications, ICIRCA 2022
作者: Srilatha, Doddi Thillaiarasu, N. School of Computing and Information Technology Reva University Bengaluru560064 India Sreenidhi Institute of Science and Technology Department of Cse Hyderabad501301 India
Intrusion Detection System (IDS) is a significant segment for maintaining network security. Likewise, as the cloud stage is rapidly developing and becoming more famous in our daily existence, it is valuable and import... 详细信息
来源: 评论
Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第2期4卷 268-281页
作者: Tian, Ye Pan, Jingwen Yang, Shangshang Zhang, Xingyi He, Shuping Jin, Yaochu Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230088 China Anhui University School of Computer Science and Technology Hefei230601 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s... 详细信息
来源: 评论
Enhanced Feature Selection for Superior Ensemble DDoS Detection in Software-Defined Networks
Enhanced Feature Selection for Superior Ensemble DDoS Detect...
收藏 引用
2024 IEEE International Conference on Future Machine Learning and Data science, FMLDS 2024
作者: Alashhab, Abdussalam Ahmed Edrah, Aisha Abbas, Maythem K. Alashhab, Mohamed Alngib, Mohamed Daha, Muhammad Yunis Alasmarya Islamic University Faculty of Information Technology Department of Computer Science Zliten Libya Western University Faculty of Engineering Department of Electrical and Computer Engineering London Canada Asia Pacific University of Technology and Innovation School of Computing Kuala Lumpur Malaysia Universiti Sultan Azlan Shah Faculty of Management and Information Technology Kuala Kangsar Malaysia School of Engineering Ulster University Belfast United Kingdom
Distributed Denial-of-Service (DDoS) attacks disrupt networks by flooding systems with traffic from multiple sources, making real-time detection essential. Integrating Machine Learning (ML) with Software-Defined Netwo... 详细信息
来源: 评论
An Implementation of Photovoltaic Solar Panel Monitoring System Based on Internet of Things
An Implementation of Photovoltaic Solar Panel Monitoring Sys...
收藏 引用
Distributed computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: J. Saranya V. Divya School of Computing Sciences Vels Institute of Science Technology & Advanced Studies Chennai India Department of Information Technology School of Computing Sciences Vels Institute of Science Technology & Advanced Studies Chennai India
The Internet of Things (IoT) is a contemporary technology that enhances user experience and adds intelligence to objects. Numerous applications have already embraced the Internet of Things. The Internet of Things (IoT... 详细信息
来源: 评论
A comparative study of various techniques for crop Disease Detection and segmentation  4
A comparative study of various techniques for crop Disease D...
收藏 引用
4th International Conference on Smart Systems and Inventive technology, ICSSIT 2022
作者: Prakash, Varun Singh, Sanjay Aggarwal, Ankur Kumar Raghav, Sagar Sood, Shubham Pandian, M. Thurai Dept. of Computer Science and Technology Manav Rachna University Faridabad India School of Computing and Information Technology REVA University Bengaluru India
Plant diseases have always been a major concern with food security in particular, the quality assurance of the agricultural products usually depends on the appropriate identification of the diseases, if any, in the cr... 详细信息
来源: 评论
A probabilistic public key encryption switching scheme for secure cloud storage
收藏 引用
International Journal of information technology (Singapore) 2023年 第2期15卷 675-690页
作者: Bhat, Radhakrishna Sunitha, N.R. Iyengar, S.S. Department of Computer Science and Engineering Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal 576104 India Department of Computer Science and Engineering Siddaganga Institute of Technology Karnataka Tumkur 572103 India School of Computing and Information Science Florida International University Miami FL United States
The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years. But, the current sta... 详细信息
来源: 评论
Automate Threat Detection and Analysis Through Intelligent Data Mining Techniques for Network Traffic and Cybersecurity  1
收藏 引用
2nd International Conference on Cyber Intelligence and information Retrieval, CIIR 2023
作者: Muloor, Kiran Hemanthraj Sahu, Somesh Samanta, Debabrata Karuppiah, Marimuthu Bhattacharya, Abhishek Dutta, Soumi LTIMindtree Limited Karnataka Bangalore India Department of Computer Science CHRIST University Karnataka Bangalore India Department of Computing and Information Technologies Rochester Institute of Technology Pristina Kosovo School of Computer Science and Engineering and Information Science Presidency University Karnataka Bengaluru560064 India Sister Nivedita University Kolkata India
Today, we are constantly surrounded by vast amounts of data, a trend that is expected to grow significantly over the next decade. The abundance of data presents challenges for thorough analysis and extraction of valua... 详细信息
来源: 评论
Diagnosis of Covid-19 from Chest X-Ray Images Using Wavelet-Based Depth Wise Convolution Network  3
Diagnosis of Covid-19 from Chest X-Ray Images Using Wavelet-...
收藏 引用
3rd International Conference on Power, Energy, Control and Transmission Systems, ICPECTS 2022
作者: Tarun, Sai Rakesh, Sai Safa, M. Saranya, G. Chakrapani, K. SRM Institute of Science and Technology Department of Networking and Communication Chennai India School of Computing SASTRA DEEMED University Department of Information Technology India
There is a great need to create and put in place a method of automatic detection as a substitute for conventional diagnosis for COVID-19 detection that can be employed on a commercialscale because there aren't as ... 详细信息
来源: 评论
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
收藏 引用
Computer Modeling in Engineering & sciences 2023年 第10期137卷 813-825页
作者: Shayla Islam Anil Kumar Budati Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah Institute of Computer Science&Digital Innovation ICSDIUCSI UniversityKuala Lumpur56000Malaysia Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Selangor43600Malaysia School of Engineering Computing and InformaticsDar Al-Hekma UniversityJeddah22246Saudi Arabia
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... 详细信息
来源: 评论